Checkpoint R65 Secure Platform Secure Platform Pro Admin Guide

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Checkpoint R65 Secure Platform Secure Platform Pro Admin Guide as PDF for free.

More details

  • Words: 27,103
  • Pages: 148
SecurePlatform™/ SecurePlatform Pro Administration Guide Version NGX R65

701680 March 13, 2007

© 2003-2007 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications. For third party notices, see: THIRD PARTY TRADEMARKS AND COPYRIGHTS.

Contents Preface

Chapter 1

Who Should Use This Guide................................................................................ 8 Summary of Contents ......................................................................................... 9 Appendices .................................................................................................. 9 Related Documentation .................................................................................... 10 More Information ............................................................................................. 13 Feedback ........................................................................................................ 14

Introduction Overview ......................................................................................................... 16 SecurePlatform Hardware Requirements ............................................................ 17 SecurePlatform Pro .......................................................................................... 18

Chapter 2

Preparing to Install SecurePlatform Preparing the SecurePlatform Machine .............................................................. 20 Hardware Compatibility Testing Tool .................................................................. 21 Getting Started ........................................................................................... 22 Using the Hardware Compatibility Testing Tool .............................................. 24 BIOS Security Configuration Recommendations .................................................. 25

Chapter 3

Configuration Using the Command Line ................................................................................. 28 First Time Setup Using the Command Line.................................................... 28 Using sysconfig .......................................................................................... 29 Check Point Products Configuration.............................................................. 31 Using the Web Interface ................................................................................... 32 First Time Setup Using the Web Interface ..................................................... 32 Web Interface Layout .................................................................................. 41 First Time Reboot and Login ............................................................................. 56

Chapter 4

Administration Managing Your SecurePlatform System .............................................................. 58 Connecting to SecurePlatform by Using Secure Shell ..................................... 58 User Management....................................................................................... 59 SecurePlatform Administrators ..................................................................... 60 FIPS 140-2 Compliant Systems ................................................................... 62 Using TFTP ................................................................................................ 63 Backup and Restore .................................................................................... 63 SecurePlatform Shell ....................................................................................... 64 Command Shell .......................................................................................... 64 Management Commands ............................................................................. 66 Documentation Commands .......................................................................... 67

Table of Contents

5

Date and Time Commands ........................................................................... 67 System Commands ..................................................................................... 70 Snapshot Image Management ...................................................................... 78 System Diagnostic Commands ..................................................................... 80 Check Point Commands............................................................................... 83 Network Diagnostics Commands................................................................... 96 Network Configuration Commands .............................................................. 102 Dynamic Routing Commands ..................................................................... 112 User and Administrator Commands............................................................. 113 SNMP Support .............................................................................................. 115 Configuring the SNMP Agent ..................................................................... 115 Configuring SNMP Traps ........................................................................... 116 Check Point Dynamic Routing ......................................................................... 120 Supported Features................................................................................... 120 Command Line Interface ........................................................................... 123 SecurePlatform Boot Loader ........................................................................... 125 Booting in Maintenance Mode.................................................................... 125 Customizing the Boot Process .................................................................... 126 Snapshot Image Management .................................................................... 126

Chapter 5

SecurePlatform Pro Advanced Routing Suite Introduction .................................................................................................. 128 Check Point Advanced Routing Suite ............................................................... 129 Supported Features................................................................................... 129 Dynamic Routing ...................................................................................... 129 Command Line Interface ........................................................................... 133

Appendix A

Installation on Computers without Floppy or CDROM Drives General Procedure ......................................................................................... 136 Client Setup .................................................................................................. 136 Server Setup ................................................................................................. 137 Required Packages ................................................................................... 137 DHCP Daemon Setup ................................................................................ 138 TFTP and FTP Daemon Setup .................................................................... 139 Hosting Installation Files ........................................................................... 140

Index.......................................................................................................... 147

6

Preface

P

Preface

In This Chapter Who Should Use This Guide

page 8

Summary of Contents

page 9

Related Documentation

page 10

More Information

page 13

Feedback

page 14

7

Who Should Use This Guide

Who Should Use This Guide This guide is intended for administrators responsible for maintaining network security within an enterprise, including policy management and user support. This guide assumes a basic understanding of

8



System administration.



The underlying operating system.



Internet protocols (IP, TCP, UDP etc.).

Summary of Contents

Summary of Contents This guide covers the following chapters: Chapter

Description

Chapter 1, “Introduction”

This chapter covers the two “flavors” of SecurePlatform, and hardware requirements

Chapter 2, “Preparing to Install SecurePlatform”

This chapter covers everything you need to do before installing SecurePlatform

Chapter 3, “Configuration”

This chapter covers using the command line interface, the web interface, and what happens when you log in for the first time

Chapter 4, “Administration”

This chapters covers the various aspects of SecurePlatform administration

Chapter 5, “SecurePlatform Pro Advanced Routing Suite”

This chapter covers SecurePlatform’s support for dynamic routing protocols

Appendices This guide contains the following appendices: Appendix

Description

Appendix A, “Installation on Computers without Floppy or CDROM Drives”

This chapter covers alternative means of installing SecurePlatform

Preface

9

Related Documentation

Related Documentation This release includes the following documentation TABLE P-1

10

VPN-1 Power documentation suite documentation

Title

Description

Internet Security Product Suite Getting Started Guide

Contains an overview of NGX R65 and step by step product installation and upgrade procedures. This document also provides information about What’s New, Licenses, Minimum hardware and software requirements, etc.

Upgrade Guide

Explains all available upgrade paths for Check Point products from VPN-1/FireWall-1 NG forward. This guide is specifically geared towards upgrading to NGX R65.

SmartCenter Administration Guide

Explains SmartCenter Management solutions. This guide provides solutions for control over configuring, managing, and monitoring security deployments at the perimeter, inside the network, at all user endpoints.

Firewall and SmartDefense Administration Guide

Describes how to control and secure network access; establish network connectivity; use SmartDefense to protect against network and application level attacks; use Web Intelligence to protect web servers and applications; the integrated web security capabilities; use Content Vectoring Protocol (CVP) applications for anti-virus protection, and URL Filtering (UFP) applications for limiting access to web sites; secure VoIP traffic.

Virtual Private Networks Administration Guide

This guide describes the basic components of a VPN and provides the background for the technology that comprises the VPN infrastructure.

Related Documentation TABLE P-1

VPN-1 Power documentation suite documentation (continued)

Title

Description

Eventia Reporter Administration Guide

Explains how to monitor and audit traffic, and generate detailed or summarized reports in the format of your choice (list, vertical bar, pie chart etc.) for all events logged by Check Point VPN-1 Power, SecureClient and SmartDefense.

SecurePlatform™/ SecurePlatform Pro Administration Guide

Explains how to install and configure SecurePlatform. This guide will also teach you how to manage your SecurePlatform machine and explains Dynamic Routing (Unicast and Multicast) protocols.

Provider-1/SiteManager-1 Administration Guide

Explains the Provider-1/SiteManager-1 security management solution. This guide provides details about a three-tier, multi-policy management architecture and a host of Network Operating Center oriented features that automate time-consuming repetitive tasks common in Network Operating Center environments.

TABLE P-2

Integrity Server documentation

Title

Description

Integrity Advanced Server Installation Guide

Explains how to install, configure, and maintain the Integrity Advanced Server.

Integrity Advanced Server Administrator Console Reference

Provides screen-by-screen descriptions of user interface elements, with cross-references to relevant chapters of the Administrator Guide. This document contains an overview of Administrator Console navigation, including use of the help system.

Integrity Advanced Server Administrator Guide

Explains how to managing administrators and endpoint security with Integrity Advanced Server.

Integrity Advanced Server Gateway Integration Guide

Provides information about how to integrating your Virtual Private Network gateway device with Integrity Advanced Server. This guide also contains information regarding deploying the unified SecureClient/Integrity client package.

Preface

11

Related Documentation TABLE P-2

12

Integrity Server documentation (continued)

Title

Description

Integrity Advanced Server System Requirements

Provides information about client and server requirements.

Integrity Agent for Linux Installation and Configuration Guide

Explains how to install and configure Integrity Agent for Linux.

Integrity XML Policy Reference Guide

Provides the contents of Integrity client XML policy files.

Integrity Client Management Guide

Explains how to use of command line parameters to control Integrity client installer behavior and post-installation behavior.

More Information

More Information •

For additional technical information about Check Point products, consult Check Point’s SecureKnowledge at https://secureknowledge.checkpoint.com/.



See the latest version of this document in the User Center at http://www.checkpoint.com/support/technical/documents

Preface

13

Feedback

Feedback Check Point is engaged in a continuous effort to improve its documentation. Please help us by sending your comments to: [email protected]

14

Chapter Introduction

1

In This Chapter Overview

page 16

SecurePlatform Hardware Requirements

page 17

SecurePlatform Pro

page 18

15

Overview

Overview Thank you for using SecurePlatform. This document describes how to install and configure SecurePlatform. SecurePlatform is distributed on a bootable CD ROM which includes Check Point’s product suite comprising: VPN-1, Check Point QoS, SmartView Monitor, Policy Server, and UserAuthority Server. The SecurePlatform CD ROM can be installed on any PC with an Intel Pentium III/IV, or AMD Athlon CPU. SecurePlatform includes a customized and hardened operating system, with no unnecessary components that could pose security risks. The system is pre-configured and optimized to perform its task as a network security device, requiring only minimal user configuration of basic elements, such as IP addresses, routes, etc. On most systems, this installation process runs less than five minutes, resulting in a network security device ready to be deployed. SecurePlatform allows easy configuration of your computer and networking aspects, as well as the Check Point products installed. An easy-to-use shell provides a set of commands, required for easy configuration and routine administration of a security system, including: network settings, backup and restore utilities, upgrade utility, system log viewing, control, and much more. A Web GUI enables most of the administration configuration, as well as the first time installation setup, to be performed from an easy–to–use Web interface.

16

SecurePlatform Hardware Requirements

SecurePlatform Hardware Requirements On SecurePlatform, the minimum hardware requirements for installing a VPN-1 SmartCenter server, Enforcement Module or SmartPortal are: •

Intel Pentium III 300+ MHz or equivalent processor



10 GB free disk space



256 MB (512 MB recommended)



One or more supported network adapter cards



CD-ROM Drive (bootable)



1024 x 768 video adapter card

For details regarding SecurePlatform on specific hardware platforms, see: http://www.checkpoint.com/products/supported_platforms/recommended/ngx/index.h tml

Note - For information about the recommended configuration of high-performance systems running Check Point Performance Pack, see the CheckPoint R65 PerformancePack Administration Guide.

Chapter 1

Introduction

17

SecurePlatform Pro

SecurePlatform Pro SecurePlatform Pro is an enhanced version of SecurePlatform. SecurePlatform Pro adds advanced networking and management capabilities to SecurePlatform such as: •

Dynamic routing



Radius authentication for SecurePlatform administrators

To install “SecurePlatform Pro” select the “SecurePlatform Pro” option during the installation. To convert regular SecurePlatform to SecurePlatform Pro, from the expert mode command line run: “pro enable”. Note - SecurePlatform Pro requires a separate license that must be installed on the SmartCenter server that manages the SecurePlatform Pro enforcement modules.

For information about RADIUS support, see: “How to Authenticate Administrators via RADIUS” on page 60 For information regarding advanced routing, see the SecurePlatform Pro & Advanced Routing Command Line Interface. For all intents and purposes, wherever the name SecurePlatform is used, SecurePlatform Pro is implicitly included.

18

Chapter Preparing to Install SecurePlatform

2

In This Chapter Preparing the SecurePlatform Machine

page 20

Hardware Compatibility Testing Tool

page 21

BIOS Security Configuration Recommendations

page 25

19

Preparing the SecurePlatform Machine

Preparing the SecurePlatform Machine SecurePlatform installation can be done from a CD drive, from a diskette, or from a network server, using a special boot diskette. Before you begin the SecurePlatform installation process, ensure that the following requirements are met: •

If the target computer has a CD drive, make sure that the system BIOS is set to reboot from this drive as the first boot option (this BIOS Setup Feature is usually named Boot Sequence).



If your target computer cannot boot from a CD drive, or if you wish to install using a remote file server, refer to the instructions in the CheckPoint R65 Internet Security Products GettingStarted Guide. Warning - The installation procedure erases all hard disks, so the former operating system cannot be recovered.

Note - SecurePlatform can be installed on a computer without a keyboard or VGA display by using a serial console attached to a serial port.

20

Hardware Compatibility Testing Tool

Hardware Compatibility Testing Tool In This Section Getting Started

page 22

Using the Hardware Compatibility Testing Tool

page 24

The Hardware Compatibility Testing Tool enables you to determine whether SecurePlatform is supported on a specific hardware platform. The utility is available for download as a CD ISO image (hw.iso). The ISO image can be burned on the blank CD-R or on the CD-RW media, using a CD-burning tool. Note - You must specify that you are burning “CD image” and not single file.

The Hardware Compatibility Testing Tool should be run in the same way that would be used to install SecurePlatform on the hardware platform (for example, boot from CD, boot from diskette and installation through network etc.). The tool detects all hardware components on the platform, checks whether they are supported, and displays its conclusions: whether SecurePlatform can be installed on the machine (supported I/O devices found, support mass storage device was found), and the number of supported and unsupported Ethernet controllers detected. The user can view detailed information on all the devices found on the machine. The user can save the detailed information on a diskette, on TFTP server, or dump it via the serial port. This information can be submitted to Check Point Support in order to add support for unsupported devices. SecurePlatform requires the following hardware: •

I/O Device (either Keyboard & Monitor, or Serial console).



mass storage device



at least one supported Ethernet Controller (If SecurePlatform is to be configured as a VPN-1 gateway, more than one controller is needed)

The tool makes no modifications to the tested hardware platform, so it is safe to use.

Chapter 2

Preparing to Install SecurePlatform

21

Getting Started

Getting Started In This Section Booting from the CD

page 22

Booting from a Diskette and Accessing a Local CD

page 22

Booting from a Diskette and Accessing the CD over the Network page 23 The user can run the tool either by booting from the CD that contains it, booting from a disk and accessing a local CD, or booting from a diskette and accessing the CD through the network. If no keyboard and monitor are connected to the hardware platform, the serial console can be used to perform the hardware detection.

Booting from the CD To boot from the CD: 1. Configure the BIOS of the machine to boot from the CD drive. 2. Insert the CD into the drive. 3. Boot the machine.

Booting from a Diskette and Accessing a Local CD This option should be used when the hardware platform cannot be configured to boot from the CD drive (but will boot from a diskette), and has a CD drive. To boot from a diskette and access a local CD: 1. Insert the CD into the drive. 2. Insert a diskette into the drive. 3. Browse to your CDROM drive and select the SecurePlatform/images folder. 4. Drop the boot.img file on the cprawrite executable. Alternatively, using NT command shell (cmd), run the following command (where D: is the CD-ROM drive): D:\SecurePlatform\images\cprawrite.exe D:\SecurePlatform\images\boot.img

5. Boot the machine.

22

Getting Started

Booting from a Diskette and Accessing the CD over the Network This option should be used when the machine to be tested has no CD drive. In this case, there will be two machines participating: •

the machine in which you will insert the CD



the machine on which you will run the tool

To boot from a diskette and access a CD over the network:

On the Machine with the CD Drive Proceed as follows: 1. Insert the CD into the drive of a (Microsoft Windows-based) machine. 2. Insert a diskette into its diskette drive. 3. Browse to the CD drive and select the SecurePlatform/images folder. 4. Drop the bootnet.img file on the cprawrite executable. Alternatively, using NT command shell (cmd), run the following command (where D: is the CD-ROM drive): D:\SecurePlatform\images\cprawrite.exe D:\SecurePlatform\images\bootnet.img

This step writes files to the diskette, which you will transfer to the other machine (the machine on which the tool will be run). 5. Make the contents available on the network, either by allowing access to the CD drive, or by copying the CD to a hard disk and enabling access to that disk (for example, by FTP, HTTP, or NFS).

On the Machine You Are Testing Proceed as follows: 1. Insert the diskette you created in step 4, above, into the diskette drive of the machine you are testing. 2. Boot the machine. 3. Configure the properties of the interface through which this machine is connected to the network, including its IP address, Netmask, default gateway and DNS. You can choose to configure this interface as a dynamic IP address interface.

Chapter 2

Preparing to Install SecurePlatform

23

Using the Hardware Compatibility Testing Tool

4. Enable access to the files on the machine with the CD drive (see step 5). 5. Specify the following settings for the other machine: •

IP address, or hostname



Package Directory



user/password (if necessary)

6. If you are installing using a serial console, instead of the keyboard and monitor, make sure that your terminal emulation software is configured as follows: •

9600 Baud rate



8 data bits



no parity



no flow control

Using the Hardware Compatibility Testing Tool The hardware tool automatically tests the hardware for compatibility. Note - A simple, “naïve” detection tool is included on the boot diskette. If for some reason, the complete detection tool is unavailable (e.g., the CDR drive is not supported), you can still use the simple tool to get some information on your hardware. The simple tool is available from the ‘Installation Method’ screen, by pressing the Probe Hardware button.

When it finishes, the tool displays a summary page with the following information: •

statement whether the Platform is suitable for installing SecurePlatform



number of supported and unsupported mass storage devices found



number of supported and unsupported Ethernet Controllers found

Additional information can be obtained by pressing the Devices button. The devices information window lists all the devices, found on the machine (grouped according to functionality). Use the arrow keys to navigate through the list. Pressing Enter on a specific device displays detailed information about that device. The detailed information can be saved to a diskette, to a TFTP Server, or dumped through the Serial Console. This action can be required in cases where some of the devices are not supported.

24

BIOS Security Configuration Recommendations

BIOS Security Configuration Recommendations The following are BIOS configuration recommendations: •

Disable the “boot from floppy” option in the system BIOS, to avoid unauthorized booting from a diskette and changing system configuration.



Apply a BIOS password to avoid changing the BIOS configuration. Make sure you memorize the password, or keep it in a safe place.

Chapter 2

Preparing to Install SecurePlatform

25

BIOS Security Configuration Recommendations

26

Chapter Configuration

3

In This Chapter Using the Command Line

page 28

Using the Web Interface

page 32

SecurePlatform enables easy configuration of your computer and networking setup, and the Check Point products installed on them.

27

Using the Command Line

Using the Command Line This section describes the sysconfig application, which provides an interactive menu system for all configuration aspects. Configuration can also be done using command line utilities provided by the SecurePlatform Shell. The SecurePlatform Shell is discussed in “SecurePlatform Shell” on page 64.

First Time Setup Using the Command Line After the installation from the CD has been completed, and the computer has been rebooted, a first time setup is required in order to: •

configure the network settings



apply the license



select which products will be installed



perform the SmartCenter initial setup, if selected

Perform the first time setup, as follows: 1. Run the sysconfig command from the console to configure SecurePlatform, using a text interface. 2. The command line setup wizard begins, and guides you through the first-time configuration. 3. Select Enter.

“n”

to proceed to the next menu, or

4. If you selected “n” and pressed Enter, the are displayed. They are:

28

“q”

to exit the Wizard, and press

Network Configuration

menu options



Host Name (Set/Show Host Name)



Domain Name (Set/Show Domain Name)



Domain Name Servers (Add/Remove/Show Domain Name Servers)



Network Connections (Add/Configure/Remove/Show Connection)



Routing (Set/Show Default Gateway)

Using sysconfig

5. You must configure the following: •

the computer’s name



the domain name, and up to three DNS servers



the computer’s network interfaces



the default gateway

6. Enter the desired option number and press Enter. The

Choose an action

menu operation options are displayed.

7. Enter the desired operation option number and press Enter. (Select press Enter to return to the previous menu.)

“e”

and

8. When you have completed the Network Configuration, select “n” and press Enter to proceed to the next menu, Time and Date Configuration. (Select “p” and press Enter to return to the previous menu, or select “q” and press Enter to exit the Wizard.) In the Time and Date Configuration menu you can enter the current date and time, as well as setting the time zone. Note - This concludes the SecurePlatform operating system installation. For detailed installation instructions for a specific product, refer to the relevant documentation for that product.

Using sysconfig Once you have performed the first time setup, via the command line setup wizard, you can use sysconfig to modify your configuration. To run sysconfig, login to SecurePlatform and enter sysconfig at the prompt. The sysconfig main menu lists various configuration items, (note that all configuration items must be defined). We recommend step by step configuration, by addressing each menu item in sequence, one after the other. Select a menu item by typing the relevant number and pressing Enter. Selecting a main menu option displays an additional menu for setting or viewing various configuration items. To return to the main menu, select the menu item Done. To quit, select Exit from the main menu. When selecting a set option, sysconfig prompts the user to enter all relevant configuration parameters. As soon as all the parameters are completed, the change is applied.

Chapter 3

Configuration

29

Using sysconfig

Note - Entering e at any point during sysconfig brings the user one menu level up.

Table 3-1

Sysconfig Configuration Options

Menu Item

Inside Each Menu Item

1

Host Name

Set or show host name.

2

Domain Name

Set or show domain name.

3

Domain Name Servers

Add or remove domain name servers, or show configured domain name servers.

4

Time & Date

Set the time zone, date and local time, or show the date and time settings.

5

Network Connections

Add or remove connections, configure network connections, or show configuration of network connections.

6

Routing

Add network and route, add new host, set default gateway, delete route, or show routing configuration.

7

DHCP Server Configuration

Configure SecurePlatform DHCP Server.

8

DHCP Relay Configuration

Setup DHCP Relay.

9

Export Setup

Exports Check Point environment.

10

Products Installation

Installs Check Point products (cpconfig). For more information, see the product installation instructions.

11

Products Configuration

Configure Check Point products (cpconfig). For more information, see “Check Point Products Configuration””, below.

30

Check Point Products Configuration

Check Point Products Configuration To configure Check Point products, select this option in the sysconfig application, or run the cpconfig application, available from the SecurePlatform Shell. For more information about configuring Check Point products, refer to the CheckPoint R65 Internet Security Products GettingStarted Guide.

As soon as you finish the Check Point products configuration procedure, you will be asked to reboot your system. After reboot, your system will be available for use. Note - You must run the Check Point Products Configuration procedure (cpconfig) in order to activate the products.

Proceed as follows: •

If you have installed an Enforcement Module, refer to the CheckPoint R65 Internet Security Products GettingStarted Guide and the CheckPoint R65 SmartCenter Administration Guide for information on how to set up a Security, VPN or QoS policy for your new gateway.



If you have installed a SmartCenter server, refer to the CheckPoint R65 Internet Security Products GettingStarted Guide and the CheckPoint R65 SmartCenter Administration Guide for information on how to connect to your new SmartCenter server, using the Check Point SmartConsole.



If you have installed VPN-1 Power, refer to the CheckPoint R65 VPN Administration Guide for more information on how to connect, and set up your new product.

Chapter 3

Configuration

31

Using the Web Interface

Using the Web Interface This chapter describes SecurePlatform’s Web interface. Most of the common operations can be done by using the Web Interface. For information about other configuration options, see “Using the Command Line” on page 28. Note - The Web interface is not accessible in the FIPS 140-2 compliant mode.

First Time Setup Using the Web Interface After the installation from the CD has been completed, and the computer has been rebooted, a first time setup is required in order to: •

configure the network settings



configure the time/date/time zone



configure the allowed IPs of SSH and administration Web UI clients



select which products will be installed



set the initial configuration of installed products

Perform the first time setup as follows: 1. Set your browser to work with the IP address you have specified while setting up your network. (e.g. https://192.168.1.1). Since it is a first time installation, the End User’s License Agreement page will be displayed. If you accept the terms of the license agreement, the Login page is displayed. Alternatively, to configure SecurePlatform using a text interface, you can run the sysconfig command from the console. 2. In the Login page, login using admin as the user name, and admin as the password. Since this is an initial user name and password, the Change Password page is displayed. 3. In the Change Password page, proceed as follows: •

32

It is recommended to utilize the available Onetime Login Key. In the Onetime Login Key section, click Download. The Login Key Challenge page is displayed. Enter a Question and Answer and click OK.

First Time Setup Using the Web Interface



Change the User name and Password for the administrator. Click Save and Login when done.

Note - The defined user name and password are used for both the Web interface and the console.

The Welcome page is displayed. The setup wizard begins, and guides you through the first-time configuration. Click Next to proceed to the next page, or Back to return to the previous page. 4. Click Next to proceed to the Network Configuration page. You may configure the IP address and network mask of each interface. You can modify the MAC address of the Ethernet interfaces, add VLANs, and so forth. Each interface can be associated with a primary IP and optionally with one or more secondary IPs. Note - This page displays a list of all physical NICs that are on the appliance.

You may configure the Primary IP address to obtain the IP automatically, using DHCP. However, this option is not recommended for deployment in a production environment. To configure the primary IP of an interface: a. Click on a specific interface. The Connection Configuration page appears. b. If you enable Use the following configuration, enter the IP address and Netmask. c. If you enable Obtain IP address automatically (DHCP), the primary IPs are obtained automatically using DHCP. d. Supply an MTU value. e. Supply a Physical Address (MAC Address). f.

Select a Link Speed and Duplex value from the drop-down box.

g. Click Apply. To add an additional IP to an interface: On the Network Connections page, click New. The Add Network Connections drop-down box is displayed. The options are: •

Secondary IP

Chapter 3

Configuration

33

First Time Setup Using the Web Interface



PPTP



PPPoE



ISDN



VLAN



Loopback

To add a secondary IP to an interface: a. Select Secondary IP. The Add Secondary IP Connection page appears. b. On the Add Secondary IP Connection page: i) Select an interface from the drop-down box ii) Supply an IP address iii) Supply a network mask Click Apply. To add a PPTP connection to an interface: a. Select PPTP. The Add PPTP Connection page appears. b. On the Add PPTP Connection page: i) Supply a Remote Server IP address ii) Supply a Remote Server name Note - Make sure that the Remote Server is accessible from this computer

iii) Supply a Username and Password iv) You can select to obtain the Default Gateway automatically v) You can select to obtain the DNS automatically vi) You can select to automatically connect on boot c. Click Apply. To add a PPPoE connection to an interface: a. Select PPPoE. The Add PPPoE Connection page appears. b. On the Add PPPoE Connection page: i) Select an interface from the drop-down box

34

First Time Setup Using the Web Interface

ii) Supply a Username and Password iii) You can select to obtain the Default Gateway automatically iv) You can select to obtain the DNS automatically v) You can select to automatically connect on boot c. Click Apply. To add an ISDN connection to an interface: a. Select ISDN. The Add ISDN Connection page appears. b. On the Add ISDN Connection page: i) Select a channel protocol from the drop-down box ii) Supply a Provider Name iii) Supply a country code iv) Supply an area code v) Supply a phone number vi) Supply a Username and Password vii) You can select to obtain the Default Gateway automatically viii) You can select to dial on demand ix) You can select to obtain the DNS automatically x) You can select to automatically connect on boot 3. Click Apply. To add a VLAN connection to an interface: a. Select VLAN. The Add VLAN Connection page appears. b. On the Add VLAN Connection page: i) Select an interface from the drop-down box ii) Supply a VLAN Number iii) If you enable Use the following configuration, enter the IP address and Netmask. iv) If you enable Obtain IP address automatically (DHCP), the primary IPs are obtained automatically using DHCP. c. Click Apply. To add a Loopback connection to an interface: Chapter 3

Configuration

35

First Time Setup Using the Web Interface

a. Select Loopback. The Add Loopback Connection page appears. b. On the Add Loopback Connection page: i) Supply an IP Address ii) Supply a Netmask c. Click Apply. 5. In the Routing Table page, you can add a static route or default route, or delete them. Note - You cannot edit an existing route. To modify a specific route, delete it and create a new route in its place. Be careful not to delete a route that allows you to connect to the device.

To delete a route: •

Select the specific route checkbox and click Delete. To configure routing:



On the Routing Table page, click New. The Add Route drop-down box is displayed. The options are: •

Route



Default Route

To add a new route: a. Select Route. The Add New Route page appears. b. On the Add New Route page, supply a: i) Destination IP Address ii) Destination Netmask iii) Interface (from the drop-down box) iv) Gateway v) Metric c. Click Apply. To add a default route: a. Select Default Route. The Add Default Route page appears.

36

First Time Setup Using the Web Interface

b. On the Add Default Route page, supply a: i) Gateway ii) Metric c. Click Apply. 6. In the DNS Servers page, provide IP addresses for up to three DNS servers. 7. In the Host and Domain Name page: •

Supply a Hostname.



Supply a Domain name.



Select an interface from the drop-down box. The Hostname will be associated with the IP of this interface.

8. In the Date and Time Setup page you can enter the current date and time, as well as setting the time zone. The date must be in the format: dd-Mon-yyyy (e.g. 31-Dec-2003). The time should be: HH:mm (e.g. 23:30). NTP is used to synchronize clocks of computers on the Internet. Click Apply to apply the date and time. Warning - If you change the date or time, and do not select Apply, the changes will not take effect.

9. In the Web/SSH Clients page, a list of configured client IPs is displayed. Only the configured client IPs are permitted to access SecurePlatform and SSH services. You can add or remove a Web/SSH client. To remove a Web/SSH client: •

Select the specific Web/SSH client checkbox and click Remove.

To add a Web/SSH client: a. In the Web/SSH displayed.

Clients

page, click New. The Add Web/SSH Client page is

b. You can add the IP address, resolvable name, or Network of the Web client. Note - The Hostname can also contain a wildcard, or the word ‘any’, which enables a connection from any Web/SSH Client.

c. Click Apply.

Chapter 3

Configuration

37

First Time Setup Using the Web Interface

10. In the Installation options page, select either Check Point Power (for headquarters and branch offices), or Check Point UTM (for medium-sized businesses). Your choices determine which other pages will be displayed by the wizard. 11. In the Products Selection page, select at least one of the following options and click Next (Your choices determine which other pages will be displayed by the wizard.): •

VPN-1 Power: Is the cornerstone of Check Point VPN-1 Power solutions, and the most comprehensive set of products and technologies for remote access, intranet, and extranet VPNs. VPN-1 Power protects the privacy of business communications over the Internet while securing critical network resources against unauthorized access.



Advanced Routing Suite: Is a suite that adds Dynamic Routing and Multicast Protocols support as an integrated part of SecurePlatform and the Check Point products installed on it. Protocols supported include RIP v.1 and v.2; OSPF; BGP; IGMP; PIM-SM and PIM-DM.



SmartCenter: Check Point's flagship management solution with an intuitive dashboard that enables administrators to centrally define the VPN, firewall and QoS policies.



Eventia Suite: Is a complete reporting system, which delivers in-depth network security activity and event information from Check Point log data.



Integrity: centrally manages desktop firewall security, intrusion prevention, outbound threat protection, and access policy enforcement. It ensures that every PC meets antivirus, patch, and other requirements before it connects to the network.



SmartPortal: a web application that allows you to manage your SmartCenter Server remotely using a web browser.

If you selected VPN-1 Power, select at least one of the following options: •

Performance Pack: A software-based acceleration module for VPN-1 Power gateways. By accelerating key security functions such as access control, encryption, NAT and accounting, it enables wire-speed firewall and VPN throughput for gigabit networks.



UserAuthority: Provides a unified, secure communication layer for authenticating users to eBusiness applications. It enables applications to make intelligent authorization decisions based on VPN-1 Power authentication and security information.

12. If you select VPN-1, the Gateway Type page is displayed. Define the gateway type if needed, or skip this option, if it is not relevant. 38

First Time Setup Using the Web Interface

a. If you select Define the gateway type, you can select: •

This gateway is a member of a Cluster

or •

This gateway uses dynamically assigned IP.

b. Click Next. Member of a Cluster If the gateway is to be configured as a member of a Cluster, you must first select This gateway is a member of a Cluster and then perform the configuration using SmartDashboard. Uses Dynamically Assigned IP If the gateway uses DAIP, it must initiate a connection. However, if the DNS Resolution feature, in the VPN Link Selection tab, is enabled, the peer will also be able to initiate the connection. 13. The Secure Internal Communication (SIC) Setup page allows you to establish Secure Internal Communication (SIC) between this Gateway and the SmartCenter server. A certificate for this Gateway is then delivered across this connection. Once the certificate arrives at this Gateway, it can then communicate with other Check Point communicating components. When running the Wizard, SIC is established by entering an Activation Key and clicking Next. At other times, SIC is established by entering an Activation Key and clicking Initialize. SIC must be initialized or re-initialized on the SmartCenter server, as well as on the Gateway. This can be done via SmartDashboard or SmartLSM by editing the Gateway object and entering the same Activation Key that you specified on this page. Click Next. 14. If you select SmartCenter, the SmartCenter page is displayed. Select one of the following options and click Next: •

Primary SmartCenter: The first SmartCenter server that is installed should always be defined as the Primary SmartCenter, whether or not you are using Check Point Management High Availability.



Secondary SmartCenter: In Check Point Management High Availability, the next SmartCenter server defined must be defined as the Secondary SmartCenter, which will take over from the Primary SmartCenter, if the Primary SmartCenter fails.

Chapter 3

Configuration

39

First Time Setup Using the Web Interface



Log Server: To reduce the SmartCenter server’s load, administrators can install Log Servers and then configure the modules to forward their logs to these Log Servers. In this case, the logs are viewed by logging with the SmartView Tracker into the Log Server machine (instead of the SmartCenter server machine). If you select Primary SmartCenter, or Secondary SmartCenter, Log Server is included.

15. Eventia Suite includes Eventia Reporter which generates reports based on the logs issued by Check Point products and Eventia Analyzer which correlates and manages real-time security events. If you select Eventia Suite, the Eventia Suite Setup Type page is displayed. You must select either Eventia Reporter, Eventia Analyzer Server or Eventia Correlation Unit, and click Next. 16. The SmartCenter GUI Clients page specifies the remote computers from which administrators will be allowed to connect to the SmartCenter server. You can also add or remove additional GUI Clients. The type, hostname/IP address and netmask of the configured GUI Clients are provided. In order to add a new GUI client, click Add. To delete a GUI Client, select the specific GUI Client checkbox and click Remove. 17. In the Add a SmartCenter GUI Client page, you can enter either a hostname, or a network. The Hostname can also contain a Wildcard, an IP address range, or the word 'any', which enables a connection from any GUI Client. Click Apply and then Next. 18. The SmartCenter Administrators page lists the configured Administrators, and enables you to add additional SmartCenter Administrators. If no Administrator has been configured, it enables you to add a SmartCenter Administrator. This SmartCenter Administrator will have Read/Write Permissions to SmartCenter and will be allowed to manage the SmartCenter Administrator accounts. Click Add to add a new Administrator to the list. To delete a SmartCenter Administrator, select the specific SmartCenter Administrator checkbox and click Remove. 19. In the Add a SmartCenter Administrator page, enter an Administrator Name and a Password. Click Apply and then Next. 20. The Summary page is the last page in the wizard, and displays all the products you selected to install. 21. Click Finish to complete the installation.

40

Web Interface Layout

Web Interface Layout The initial configuration of SecurePlatform is performed using the First-Time Configuration Wizard. The SecurePlatform Web UI is then used to further configure SecurePlatform. The Web UI layout is divided into three parts: •

The main navigation menu, on the left, provides navigation between the main categories.



The Page Title pane, on the upper right, contains the Help and Logout links.



The Page Contents pane, on the lower right, displays the page data.

Status The Status category provides a concise summary of the system’s functionality.

Device Status This page provides a summary of the device status, and displays information, such as the machine host name, Version and Build, and Installation Type.

Network This category provides the tools to specify the management parameters of your network settings, such as physical network interfaces, VLANs, Routing, DNS, and other devices.

Network Connections This page enables you to edit the properties of existing network connections (for example, xDSL connections using PPPoE or PPTP) and to add VLANs to ethernet interface. The Network Connections table displays all available network connections. To use the table: 1. Click the specific interface link to edit the properties of a specific connection.

Chapter 3

Configuration

41

Web Interface Layout

2. Select the specific interface checkbox and click Delete to delete a selected connection. Note - You can disable an interface, by selecting the specific interface checkbox, and clicking the Down button. Loopback and Ethernet connection cannot be deleted.

3. To add a connection, Click New and select the connection type from the drop-down list. Click Apply 4. Click Refresh to refresh the table (in case the configuration was changed while you were on this page).

Routing This page enables you to manage the routing table on your device. You can add a static or default route, or delete them. Note - You cannot edit an existing route. To modify a specific route, delete it and create a new route in its place. Be careful not to delete a route that allows you connect to the device.

To delete a route: •

Select the specific route checkbox and click Delete.

To configure routing: On the Routing Table page, click New. The Add Route drop-down box is displayed. The options are: •

Route



Default Route

To add a new route: 1. Select Route. The Add New Route page appears. 2. On the Add New Route page, supply a: a. Destination IP Address i.

Destination Netmask

ii. Interface (from the drop-down box) iii. Gateway iv. Metric 42

Web Interface Layout

v.

Click Apply.

To add a default route: 1. Select Default Route. The Add Default Route page appears. 2. On the Add Default Route page, supply a: a. Gateway b. Metric c. Click Apply.

DNS In the DNS page, you can define up to three DNS servers. Domain In the Host and Domain Name page: •

Supply a Hostname.



Supply a Domain name.



Select a primary interface from the drop-down box. The Hostname will be associated with the IP of this interface.

Hosts This page enables you to configure the host’s local resolving configuration. You can add a new host by clicking New, and delete an existing entry, by selecting the specific Hostname checkbox and clicking Delete. To add a Host: 1. Click New. The Add Host page is displayed. 2. In the Add Host page: •

Supply a Hostname.



Supply a Host IP Address

3. Click Apply.

Device The device category enables you to control the device itself. It contains the following topics:

Chapter 3

Configuration

43

Web Interface Layout



Control



Date and Time



Backup



Upgrade



Administration Web Server



Device Administrators



Authentication Servers



Web and SSH Clients



Administrator Security



SmartCenter Administrators



SmartCenter GUI Clients



Download SmartConsole Applications

Control This page provides diagnostics information about all the processes that are running on the machine. For each Process, the User, PID, Parent PID, %CPU, % Memory and Command are displayed. You can use the Device Control drop-down list to Start, Restart, or Stop any of the Check Point products. In addition, you can Shutdown the device, or Reboot it, or download a diagnostic file (cpinfo output) useful for support. You can refresh the information displayed in the page by clicking Refresh. You can save the currently viewed diagnostics information in a file.

Date and Time This page allows you to define the SecurePlatform’s date and time, optionally using NTP. In the Date and Time Setup page you can enter the current date and time, as well as setting the time zone. The date must be in the format: dd-Mon-yyyy (e.g. 31-Dec-2003). The time should be: HH:mm (e.g. 23:30). NTP is used to synchronize clocks of computers on the Internet.

44

Web Interface Layout

Click Apply to set the date and time. Warning - If you change the date or time, and do not select Apply, the changes will not take effect.

Backup This page allows you to configure backup settings. You can choose to configure a scheduled backup, or you can choose to perform an instantaneous backup operation. The backup data can be stored on a TFTP Server, SCP Server, or locally. In addition, you can view a Backup Log. Note - If you use a stock TFTP Server with Unix/Linux flavors, you must create a world writable file having the same name as the proposed backup file before executing the backup. Otherwise, the backup will not succeed. It is strongly recommended that you refer to your tftp server manual , or simply to the tftp protocol, and verify that the usage of the util is compliant with the environment that you are working in.

The SecurePlatform backup mechanism enables exporting snapshots of the entire dynamic configuration. Exported configurations can later be imported in order to restore a previous state in case of failure. The mechanism is also used for seamless upgrades of the software. Information Backed Up The information backed up includes: •

All settings performed by the Admin GUI



Network configuration data



Database of user settings (personal favorites, credentials, cookies etc.)

Two common use cases are: •

When the current configuration stops working, a previous exported configuration may be used in order to revert to a previous system state.



Upgrading to a new SecurePlatform version. The procedure would include: •

Backing up the configuration of the current version



Installing the new version



Importing the backed up configuration

Backup can be performed in configurable schedules.

Chapter 3

Configuration

45

Web Interface Layout

The Backup page displays the Current device date and time. This field shows the user the current local time of the device, which may be different than the browser machine time. Viewing the Scheduling Status To view the Scheduling Status: The Scheduling Status pane displays the following information: •

Enabled: backup currently enabled.



Backup to: backup destination which can be one of the following: the current SecurePlatform, a TFTP Server, or an SCP Server,



Start at: time to start the backup.



Recur every: recurrence pattern.

Restoring the Backup To restore the backup, run the restore shell command from the device. The syntax is as follows: restore [-h] [-d][[--tftp <ServerIP> ] | [--scp <ServerIP> <Username> <Password> ] | [--file ]]

46

Web Interface Layout

Parameters Table 3-2

parameter

meaning

-h

obtain usage

-d

debug flag

--tftp <ServerIP> []

IP address of TFTP server, from which the configuration is restored, and the filename.

--scp <ServerIP> <Username> <Password> []

IP address of SCP server, from which the configuration is restored, the username and password used to access the SCP Server, and the filename.

--file

Specify a filename for restore operation, performed locally.

When the restore command is executed by itself, without any additional flags, a menu of options is displayed. The options in the menu provide the same functionality, as the command line flags, for the restore command Choose one of the following: ----------------------------------------------------------------[L] Restore local backup package [T] Restore backup package from TFTP server [S] Restore backup package from SCP server [R] Remove local backup package [Q] Quit ----------------------------------------------------------------

Select the operation of your choice. Restoring Backups of Older Versions of SecurePlatform When restoring backups of older versions of SecurePlatform, such as FP2, FP3 and NG AI, only system settings, such as routes, IP configuration, VLAN interfaces configuration, user accounts, hostname and domainname, and WebUI port will be restored. You can not restore backups saved on newer SecurePlatform versions onto an older SecurePlatform version, for example you can not restore backups saved on R55 onto NG AI.

Chapter 3

Configuration

47

Web Interface Layout

When restore detects that the currently installed version of Check Point products does not match the version that was stored in the backup file, the following information will be displayed: When restoring from backups of SecurePlatform NG AI R55 and later:

The following information will be restored: system -----------------------------------------------------------------The following information will NOT be restored: cp_products ------------------------------------------------------------------

Choose one of the following: -----------------------------------------------------------------[C]

Continue.

[M]

Modify which information to restore.

[Q]

Quit.

-----------------------------------------------------------------Your choice: If you choose to continue, only system settings will be restored When restoring from backups of SecurePlatform NG AI and earlier, the following information will be shown:

Restoring... Backup file was created MM-DD-YYYY-HH:MM. The MD5 checksum of the backup file is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. Do you wish to restore this file (Y/N)? If you choose "N", the restore operation will be aborted.

The restore operation will replace current configuration.

48

Web Interface Layout

After restore you have to reboot your system. Do you wish to proceed (Y/N)? If you choose "N", the restore operation will be aborted.

Restore completed successfully. You have to reboot your system now. Reboot now (Y/N)? Scheduling a Backup To schedule a backup: 1. On the Backup page, click Scheduled backup. The Scheduled backup page appears. 2. Select the Enable backup recurrence checkbox. 3. Set up the backup schedule. 4. Select a device to hold the backup. The options include the current SecurePlatform, a TFTP Server (Trivial File Transfer Protocol: A version of the TCP/IP FTP protocol that has no directory or password capability), or an SCP Server (SCP is a secure FTP protocol). 5. Click Apply. To execute a backup: •

Click Backup now.

Viewing the Backup Log To view the backup log: •

Click View backup log. The Backup Log page appears. You will see the Device Date and Time, Location (the device to which the backup has been sent), Location IP Address, Backup Status and Details.

Chapter 3

Configuration

49

Web Interface Layout

Upgrade To upgrade your device: 1. Select the upgrade package file. 2. Click Upload package to device. 3. Select either Safe Upgrade, or Double-Safe Upgrade. If you selected Double-Safe Upgrade, your browser will automatically try to perform the first login immediately after the upgrade, within the time interval that you set. To enable that, you should not close the Upgrade page, and not browse to any other page. Otherwise, you will have to login manually, before the above interval expires. If you do not login manually within the above interval, the system will interpret this as a loss of connectivity and reset to the saved state. 4. When you are done uploading the package, you can click on the "package information" link to see detailed information about the package, including version information and the MD5 checksum of the package. This checksum can be used to verify that the package is correct. 5. Click Start Upgrade. The Upgrade Status pane provides information such as Action, Start Time, Status and Details.

Administration Web Server This page allows you to configure the Administration Web server listening IP and port. 1. Supply the port. 2. You can select an address from the drop-down list, instead of All. In that case, the Web server will only listen on that IP. 3. Click Apply.

50

Web Interface Layout

Device Administrators This page lists the Device Administrators, allows you to create a Device Administrator, and download a One Time Login Key. To create a Device Administrator: 1. On the Administrator Configuration page, click New. The Add New Administrator page appears. 2. Provide a name and a password for the Device Administrator. 3. Select an Authentication Scheme from the drop-down list. 4. Click Apply. To download a One Time Login Key: 1. Click Download. Note - The One Time Login Key will be required in case you forget your password. Save this file in a safe place.

The Login Key Challenge page is displayed. 2. Supply a challenge-question and answer to protect your Login Key from unauthorized usage. 3. Click OK.

Authentication Servers This page lists the configured RADIUS Authentication Servers and Authentication Server Groups. It also allows you to add a new RADIUS server and a new Authentication Server Group, or delete them. Note - All Administrators must be authenticated by one of the supported authentication methods. As well as being authenticated through the internal database, Administrators may also be authenticated via RADIUS.

To add a new RADIUS server: 1. In the Authentication Servers section, click New. The New RADIUS Server page is displayed. 2. In the New RADIUS Server page: •

Supply a Name

Chapter 3

Configuration

51

Web Interface Layout



Supply an IP address

Note - The Port and Timeout values are predefined.



Supply a Shared Secret

3. Click Apply. To add a new Authentication Server Group: 1. In the Authentication Server Group section, click New. The New Authentication Server Group page is displayed. 2. In the New Authentication Server Group page supply a Group name and click Apply.

Web/SSH Clients In the Web/SSH Clients page, a list of configured client IPs is displayed. Only the configured client IPs are permitted to access SecurePlatform and SSH services. You can add or remove a Web/SSH client. To remove a Web/SSH client: •

Select the specific Web/SSH client checkbox and click Remove.

To add a Web/SSH client: 1. In the Web/SSH Clients page, click Add. The Add Web/SSH Client page is displayed. 2. You can add the IP address, resolvable name, or Network of the Web client. Note - The Hostname can also contain a wildcard, or the word ‘any’, which enables a connection from any Web/SSH Client.

3. Click Apply.

Administrator Security In the Administrator Security window, you can configure the Administrator Security parameters. To configure Administrator Security parameters: 1. Set the Administrator Session Timeout value.

52

Web Interface Layout

2. In the Administrator Login Restrictions section, enable and set the Lock Administrator’s account after <x> login failures. 3. Set the Unlock Administrator’s account after minutes. 4. Click Apply.

SmartCenter Administrators The SmartCenter Administrators page lists the configured Administrators. If no Administrator has been configured, it enables you to add a SmartCenter Administrator. This SmartCenter Administrator will have Read/Write Permissions to SmartCenter and will be allowed to manage the SmartCenter Administrator accounts. Only one administrator can be added to this list. In order to add more administrators the user must use SmartDashboard. To delete a SmartCenter Administrator, select the specific SmartCenter Administrator checkbox and click Remove. In the Add a SmartCenter Administrator page, enter an Administrator Name and a Password. Click Apply.

SmartCenter GUI Clients The SmartCenter GUI Clients page lists the type, hostname/IP address and netmask of the configured GUI Clients, and enables you to add additional GUI Clients or remove them. To delete a GUI Client, select the specific GUI Client checkbox and click Remove. In order to add a new GUI client, click Add. In the Add GUI Client page, you can enter either a hostname, or a network. The Hostname can also contain a Wildcard, an IP address range, or the word 'any', which enables a connection from any GUI Client. Click Apply.

Product Configuration The products category enables you to define which products are installed on the device (Products page) as well as to apply licenses to these products (Licenses page).

Chapter 3

Configuration

53

Web Interface Layout

Products Installed This page enables you to check (via the table), which products are already installed on the machine. Note - VPN-1 Power should always be installed.

Certificate Authority Internal Certificate Authority The entity in charge of issuing certificates for management station, modules, users and other trusted entities such as OPSEC applications used in the system. Certificate Authority Page The Certificate Authority page lists key parameters of the SmartCenter Certificate Authority. These are: •

Certificate Authority Status



SmartCenter DN



Fingerprint

Clicking Reset retrieves the current parameter values.

Licenses Use the Licenses page to apply a license for the products that you have installed. To apply a license: 1. You can click the Check Point User Center link to obtain a license from the User Center. 2. Click New. 3. Enter the IP Address, Expiration Date, SKU/Features, and Signature Key. 4. You can also copy the license string into the clipboard, and click Paste License to copy all the information into the fields.

54

Web Interface Layout

5. Click Apply when done. Note - License can also be applied by using SmartUpdate.

Logout Click Logout to log out from the system. The Logon page is displayed.

Chapter 3

Configuration

55

First Time Reboot and Login

First Time Reboot and Login As soon as the system reboots, after installation, the SecurePlatform NGX Boot Loader screen will appear. Note - The Boot Loader appears on the console, connected to the computer. The console can be a monitor and keyboard attached to the computer, or a serial console attached to the first serial port (com1).

The Boot Loader offers a selection of boot options. By default, if there is no user intervention, the first option will be selected after a few seconds. For now, allow this option to run. Detailed information about the Boot Loader can be found in “SecurePlatform Boot Loader” on page 125”. As soon as the reboot finishes, a login prompt is displayed.

56

Chapter Administration

4

In This Chapter Managing Your SecurePlatform System

page 58

SecurePlatform Shell

page 64

SNMP Support

page 115

Check Point Dynamic Routing

page 120

SecurePlatform Boot Loader

page 125

This chapter discusses how to manage the SecurePlatform system, how to use the SecurePlatform’s shell commands, and how to configure SNMP for use with SecurePlatform. In addition, the Dynamic Routing and Boot Loader features are discussed.

57

Managing Your SecurePlatform System

Managing Your SecurePlatform System In This Section Connecting to SecurePlatform by Using Secure Shell

page 58

User Management

page 59

SecurePlatform Administrators

page 60

FIPS 140-2 Compliant Systems

page 62

Using TFTP

page 63

Backup and Restore

page 63

This section provides information on how to manage your SecurePlatform NGX system, using the SecurePlatform Command Shell. The Command Shell provides a set of commands required for configuration, administration and diagnostics of various system aspects. To manage security, VPN and QoS policies use either the: •

SmartConsole for Enterprise products or



VPN-1 SmallOffice NG Web GUI for VPN-1 SmallOffice.

For more information about SmartConsole refer to the CheckPoint R65 SmartCenter Administration Guide and the relevant product Release Notes.

Connecting to SecurePlatform by Using Secure Shell SecurePlatform NGX provides an SSH service, which allows secured, authenticated and encrypted access to the SecurePlatform system. SSH (or Secure SHell) is a protocol for creating a secure connection between two systems. In the SSH protocol, the client machine initiates a connection with a server machine. The following safeguards are provided by SSH:

58



After an initial connection, the client can verify that it is connecting to the same server during subsequent sessions.



The client can transmit its authentication information to the server, such as a username and password, in an encrypted format.



All data, sent and received, during the connection is transferred using strong encryption, making it extremely difficult to decrypt and read.

User Management

The SSH service runs, by default. In addition, access to the SSH service is limited to the same IPs that have been allowed access to the Web UI. Granular control of machines that are allowed access to the SecurePlatform system, using SSH, can be set, using the VPN-1 security policy. SSH login is allowed using the Standard Mode account user name and password, only. SCP service and client files can be copied to and from SecurePlatform, using SCP client software. Access to SCP is controlled, by editing /etc/scpusers.

User Management SecurePlatform Shell includes two permission levels (Modes): Standard and Expert.

Standard Mode This is the default mode, when logging in to a SecurePlatform system. In Standard Mode, the SecurePlatform Shell provides a set of commands, required for easy configuration and routine administration of a SecurePlatform system. Most system commands are not supported in this Mode. Standard mode commands are listed in “SecurePlatform Shell” on page 64. Standard Mode displays the following prompt: [hostname]#, where hostname is the host name of the machine.

Expert Mode The Expert Mode provides the user with full system root permissions and a full system shell. Switching from Standard Mode to Expert Mode requires a password. The first time you switch to Expert mode you will be asked to select a password. Until then, the password is the same as the one that you set for Standard Mode. You need to enter the first replacement password that you used when logging in as the admin user. Any sequential admin password change will not update the expert password that you must enter at the first-time expert user password change. To exit Expert Mode, run the command exit. Expert Mode displays the following prompt: [Expert@hostname]#, where hostname is the host name of the machine. Warning - Expert Mode should be used with caution. The flexibility of an open shell, with a root permission, exposes the system to the possibility of administrative errors.

Chapter 4

Administration

59

SecurePlatform Administrators

Note - An Expert user must first login as a Standard user, and only then enter the expert command to access Expert Mode. Until you change passwords, the Expert password is the same password that you set for Standard Mode, i.e. you need to enter the first replacement password that you used when logging in as the admin user. Any sequential admin password change will not update the expert password that you must enter at the first-time expert user password change.

SecurePlatform Administrators SecurePlatform NGX supports multiple administrator access to the regular shell. This can be used to audit configuration changes performed by administrators. Every such change is logged to the system's syslog mechanism, with the username of the administrator, as a tag. To configure another administrator from the cpshell, use the following command: adduser [-x EXTERNAL_AUTH] <user name>

Note - Only SecurePlatform Pro supports RADIUS authentication for SecurePlatform Administrators.

You will be asked to enter and confirm a password for the administrator. The password must conform to the following complexity requirements: •

at least 6 characters, in length



a mixture of alphabetic and numeric characters



at least four different characters



does not use simple dictionary words, or common strings such as “qwerty”

To delete an administrator from the cpshell, use the following command: deluser

You can also define additional administrators through the Web GUI.

How to Authenticate Administrators via RADIUS All Administrators must be authenticated by one of the supported authentication methods. As well as being authenticated through the internal database, Administrators may also be authenticated via RADIUS. SecurePlatform administrators can be authenticated using the RADIUS server in two ways:

60

SecurePlatform Administrators



By configuring the local user authentication via the RADIUS server. In this case it is necessary to define all users that will be authenticated by the RADIUS server on every SecurePlatform machine, and it is NOT required to define any RADIUS groups.



By defining the list of RADIUS groups. All users that belong to the RADIUS groups defined on SecurePlatform will be able to authenticate and perform login.

The option utilizing RADIUS groups allows more flexibility, by eliminating the need to define all RADIUS users on each SecurePlatform machine. There is a special RADIUS group called any. When this group is present in the group list, ALL users defined on the RADIUS server will be able to log into the SecurePlatform machine. To authenticate an Administrator via RADIUS, you must: 1. Verify that a RADIUS server is configured. If a RADIUS server is not configured, add one by using the following command: radius servers add <server[:port]> <secret>

Related Documents